SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Social media threats
Warning! 
May contain mild peril
• 
What is social media? 
• 
Risks associated with social media 
• 
How the threats work 
• 
Social media spam 
• 
Social media phishing 
• 
Social media malware 
• 
Using social media safely 
Contents
What is social media?
Social media has arrived 
Social networking sites are now more popular than web-based email
• 
Allows users to become a member of an online community 
• 
Key features are “Profiles” and “Friend lists” 
• 
The most commonly used social network is still Facebook 
• 
2009 saw the rapid emergence of Twitter 
• 
Also called social networking 
Social media –key features
Risks associated with social media
Users 
publishing information 
Social 
networking 
attacks 
Two main types of threat
• 
Reveal sensitive information 
• 
Defamation of others/school system 
This can be inadvertent or deliberate 
And the repercussions include: 
• 
Reputation damage 
• 
Fines 
Users publishing information
Hobby/ 
showing off 
Financially-motivated 
organized crime 
Social networking attacks
Social networking accounts 
are valuable to hackers 
They can use them to send spam, 
spread malware, steal identities... 
… in the quest to acquire personal 
information for financial gain 
Social networking attacks
Data =$$$ 
• 
Steal your money directly 
• 
Sell your data 
• 
Trick your friends and family intosupplying personal data 
• 
Sell your identity 
• 
Use your accounts to spread spam, malwareand more data theft scams! 
• 
Sell your school’s data or sensitive information 
• 
Blackmail individuals and organizations
How the threats work
How the threats work 
• 
Spam 
• 
Phishing 
• 
Malware
Social networking spam
Social networking spam
Social networking spam
Social networking spam
Social networking spam
Social networking spam
of social networking users 
report being hit by spam 
via the services 
57% 
70.6% 
That’s an increase of 
from a year ago 
Social networking spam
Social networking phishing
Social networking phishing
Social networking phishing
Social networking phishing
of social networking users 
report phishingattacks 
via the sites 
30% 
42.9% 
That’s an increase of 
from a year ago 
Social networking phishing
Social networking malware
Social networking malware
Social networking malware
Social networking malware
Social networking malware
Social networking malware
Using social media safely
• 
KNOW THE RULES -check your organization’s policy on social networking 
• 
USE SECURE PASSWORDS -minimum 14 characters including non-letters 
• 
CHECK THE DEFAULT SETTINGS -don’t providing personal information by default 
• 
BE PICTURE PRUDENT -think before posting images that might cause embarrassment 
• 
BEWARE OF BIG BROTHER -assume everyone can read your posts, including hackers! 
• 
SECURE YOUR COMPUTERS -use up-to-date security software and firewalls 
• 
THINK BEFORE YOU CLICK -if the email looks dodgy it probably is 
• 
STRANGER DANGER -beware of unsolicited invitations from spammers 
Top tips for staying secure
• 
Financially-motivated criminals are increasingly using social media sites to steal identities, spread malware and send spam 
• 
Social networks are getting better at protecting users against these threats –but there’s a long way to go 
• 
The onus is on YOUto use social media sites safely – follow the top tips for staying secure 
Summary
Thank you

Contenu connexe

Tendances

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Social media, Depression, & Suicide: What We Know & How Social Work Can Help
Social media, Depression, & Suicide: What We Know & How Social Work Can Help Social media, Depression, & Suicide: What We Know & How Social Work Can Help
Social media, Depression, & Suicide: What We Know & How Social Work Can Help Sean Erreger LCSW
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Social Media & it's Impact in Today's World
Social Media & it's Impact in Today's WorldSocial Media & it's Impact in Today's World
Social Media & it's Impact in Today's WorldStephen Mokiwa
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptxSonuRoy30
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
OSINT using Twitter & Python
OSINT using Twitter & PythonOSINT using Twitter & Python
OSINT using Twitter & Python37point2
 

Tendances (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Social Media
Social MediaSocial Media
Social Media
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Social media, Depression, & Suicide: What We Know & How Social Work Can Help
Social media, Depression, & Suicide: What We Know & How Social Work Can Help Social media, Depression, & Suicide: What We Know & How Social Work Can Help
Social media, Depression, & Suicide: What We Know & How Social Work Can Help
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Social Media & it's Impact in Today's World
Social Media & it's Impact in Today's WorldSocial Media & it's Impact in Today's World
Social Media & it's Impact in Today's World
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
OSINT using Twitter & Python
OSINT using Twitter & PythonOSINT using Twitter & Python
OSINT using Twitter & Python
 

En vedette

SandPointe_September Market Perspective 2014
SandPointe_September Market Perspective 2014SandPointe_September Market Perspective 2014
SandPointe_September Market Perspective 2014Roger Brinner
 
GearingUp-Garages-FINAL-WEB
GearingUp-Garages-FINAL-WEBGearingUp-Garages-FINAL-WEB
GearingUp-Garages-FINAL-WEBAlicia Barker
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
Ato de brincar para crianças surdas
Ato de brincar para crianças surdasAto de brincar para crianças surdas
Ato de brincar para crianças surdasSthéfany Cechinel
 
Building Services 1 - Ventilation in Heritage Building
Building Services 1 - Ventilation in Heritage BuildingBuilding Services 1 - Ventilation in Heritage Building
Building Services 1 - Ventilation in Heritage BuildingAfiqah Zariful
 
PTOLEMUS Consulting Group - Evolution de l'assurance télématique en Europe - ...
PTOLEMUS Consulting Group - Evolution de l'assurance télématique en Europe - ...PTOLEMUS Consulting Group - Evolution de l'assurance télématique en Europe - ...
PTOLEMUS Consulting Group - Evolution de l'assurance télématique en Europe - ...Matthieu Noel
 
Power point presentation acid
Power point presentation acidPower point presentation acid
Power point presentation acidnayana3117
 

En vedette (15)

Unit 5
Unit 5Unit 5
Unit 5
 
Rules og comp
Rules og compRules og comp
Rules og comp
 
Planning
PlanningPlanning
Planning
 
SandPointe_September Market Perspective 2014
SandPointe_September Market Perspective 2014SandPointe_September Market Perspective 2014
SandPointe_September Market Perspective 2014
 
Planning
PlanningPlanning
Planning
 
maglev trains
maglev trainsmaglev trains
maglev trains
 
GearingUp-Garages-FINAL-WEB
GearingUp-Garages-FINAL-WEBGearingUp-Garages-FINAL-WEB
GearingUp-Garages-FINAL-WEB
 
Planning
PlanningPlanning
Planning
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Ato de brincar para crianças surdas
Ato de brincar para crianças surdasAto de brincar para crianças surdas
Ato de brincar para crianças surdas
 
Building Services 1 - Ventilation in Heritage Building
Building Services 1 - Ventilation in Heritage BuildingBuilding Services 1 - Ventilation in Heritage Building
Building Services 1 - Ventilation in Heritage Building
 
PTOLEMUS Consulting Group - Evolution de l'assurance télématique en Europe - ...
PTOLEMUS Consulting Group - Evolution de l'assurance télématique en Europe - ...PTOLEMUS Consulting Group - Evolution de l'assurance télématique en Europe - ...
PTOLEMUS Consulting Group - Evolution de l'assurance télématique en Europe - ...
 
Power point presentation acid
Power point presentation acidPower point presentation acid
Power point presentation acid
 
group technology
group technologygroup technology
group technology
 

Similaire à Social media-threats

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNorth Texas Chapter of the ISSA
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By AnamikaGisha Mathyari
 
power of social media complete slides
power of social media complete slidespower of social media complete slides
power of social media complete slidesAmnaIqbal80
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptxKarmel7
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdfRobin540999
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social MediaDilna DV
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 

Similaire à Social media-threats (20)

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Social Network
Social NetworkSocial Network
Social Network
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
power of social media complete slides
power of social media complete slidespower of social media complete slides
power of social media complete slides
 
Social networking
Social networkingSocial networking
Social networking
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx2. ETECH Module 2 - Internet Safety and Security.pptx
2. ETECH Module 2 - Internet Safety and Security.pptx
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdf
 
Social networking
Social networkingSocial networking
Social networking
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 

Social media-threats